Tracking Browser Fingerprint Evolutions - Antoine Vastel
Offered By: IEEE via YouTube
Course Description
Overview
Explore the evolution of browser fingerprinting techniques and their implications for user tracking in this IEEE conference talk. Delve into the FP-STALKER approach, which links browser fingerprint evolutions to enable long-term tracking despite frequent changes. Learn about the rule-based and hybrid variants of FP-STALKER, and examine the results of an empirical study involving nearly 100,000 fingerprints from over 1,900 distinct browser instances. Discover how this innovative method can track browsers for an average of 54.48 days, with some browsers being trackable for more than 100 days. Gain insights into the broader implications of fingerprinting, fingerprint uniqueness, and the challenges of maintaining user privacy in the face of evolving tracking technologies.
Syllabus
Introduction
Browser fingerprinting
Broader fingerprint
Fingerprint uniqueness
Fingerprint Tracking
Rulebased Algorithm
Random Forest
Vectorization
Random Forest Model
Evaluation
Fingerprint Sequence
Chains
Tracking Duration
Ownership
Average Ownership
IP Version
Conclusion
Taught by
IEEE Symposium on Security and Privacy
Tags
Related Courses
OPSEC and Personal Security Guide - Cybertalk Episode 7HackerSploit via YouTube Introduction to Operational Security
CAE in Cybersecurity Community via YouTube XHOUND - Quantifying the Fingerprintability of Browser Extensions
IEEE via YouTube The State of Credential Stuffing and the Future of Account Takeovers
OWASP Foundation via YouTube Breaking Fraud and Bot Detection Solutions
OWASP Foundation via YouTube